Author:
Cramer Ronald,Gennaro Rosario,Schoenmakers Berry
Subject
Electrical and Electronic Engineering
Reference38 articles.
1. J. Cohen, M. Fischer: A robust and verifiable cryptographically secure election scheme. In Proc. 26-th IEEE Symposium on Foundations of Computer Science (FOCS ′85). IEEE Computer Society, 1985, p. 372-382.
2. J. Benaloh, M. Yung: Distributing the power of a government to enhance the privacy of voters. In Proc. 5-th ACM Symposium on Principles of Distributed Computing (PODC ′86), New York, 1986. A.C.M., p. 52-62.
3. J. Benaloh: Verifiable secret-ballot elections. PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September 1987.
4. J. Benaloh, D. Tuinstra: Receipt-free secret-ballot elections. In Proc. 26-th Symposium on Theory of Computing (STOC ′94), New York, 1994. A.C.M., p. 544-553.
5. Untraceable electronic mail, return addresses, and digital pseudonyms;Chaum;Communications of the ACM,1981
Cited by
148 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献